test_ap_track.py 14 KB

123456789101112131415161718192021222324252627282930313233343536373839404142434445464748495051525354555657585960616263646566676869707172737475767778798081828384858687888990919293949596979899100101102103104105106107108109110111112113114115116117118119120121122123124125126127128129130131132133134135136137138139140141142143144145146147148149150151152153154155156157158159160161162163164165166167168169170171172173174175176177178179180181182183184185186187188189190191192193194195196197198199200201202203204205206207208209210211212213214215216217218219220221222223224225226227228229230231232233234235236237238239240241242243244245246247248249250251252253254255256257258259260261262263264265266267268269270271272273274275276277278279280281282283284285286287288289290291292293294295296297298299300301302303304305306307308309310311312313314315316317318319320321322323324325326327328329330331332333334335336337338339340341342343344345346347348349350351352353354355356357358359360361362363364365366367368369370371372373374375376377378379380381382383384385386387388389390391392393
  1. # Test cases for hostapd tracking unconnected stations
  2. # Copyright (c) 2015, Jouni Malinen <j@w1.fi>
  3. #
  4. # This software may be distributed under the terms of the BSD license.
  5. # See README for more details.
  6. import logging
  7. logger = logging.getLogger()
  8. import subprocess
  9. import time
  10. import hostapd
  11. from wpasupplicant import WpaSupplicant
  12. def test_ap_track_sta(dev, apdev):
  13. """Dualband AP tracking unconnected stations"""
  14. try:
  15. _test_ap_track_sta(dev, apdev)
  16. finally:
  17. subprocess.call(['iw', 'reg', 'set', '00'])
  18. def _test_ap_track_sta(dev, apdev):
  19. params = { "ssid": "track",
  20. "country_code": "US",
  21. "hw_mode": "g",
  22. "channel": "6",
  23. "track_sta_max_num": "2" }
  24. hapd = hostapd.add_ap(apdev[0], params)
  25. bssid = apdev[0]['bssid']
  26. params = { "ssid": "track",
  27. "country_code": "US",
  28. "hw_mode": "a",
  29. "channel": "40",
  30. "track_sta_max_num": "100",
  31. "track_sta_max_age": "1" }
  32. hapd2 = hostapd.add_ap(apdev[1], params)
  33. bssid2 = apdev[1]['bssid']
  34. for i in range(2):
  35. dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
  36. dev[0].scan_for_bss(bssid2, freq=5200, force_scan=True)
  37. dev[1].scan_for_bss(bssid, freq=2437, force_scan=True)
  38. dev[2].scan_for_bss(bssid2, freq=5200, force_scan=True)
  39. addr0 = dev[0].own_addr()
  40. addr1 = dev[1].own_addr()
  41. addr2 = dev[2].own_addr()
  42. track = hapd.request("TRACK_STA_LIST")
  43. if addr0 not in track or addr1 not in track:
  44. raise Exception("Station missing from 2.4 GHz tracking")
  45. if addr2 in track:
  46. raise Exception("Unexpected station included in 2.4 GHz tracking")
  47. track = hapd2.request("TRACK_STA_LIST")
  48. if addr0 not in track or addr2 not in track:
  49. raise Exception("Station missing from 5 GHz tracking")
  50. if addr1 in track:
  51. raise Exception("Unexpected station included in 5 GHz tracking")
  52. # Test expiration
  53. time.sleep(1.1)
  54. track = hapd.request("TRACK_STA_LIST")
  55. if addr0 not in track or addr1 not in track:
  56. raise Exception("Station missing from 2.4 GHz tracking (expiration)")
  57. track = hapd2.request("TRACK_STA_LIST")
  58. if addr0 in track or addr2 in track:
  59. raise Exception("Station not expired from 5 GHz tracking")
  60. # Test maximum list length
  61. dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
  62. dev[1].scan_for_bss(bssid, freq=2437, force_scan=True)
  63. dev[2].scan_for_bss(bssid, freq=2437, force_scan=True)
  64. track = hapd.request("TRACK_STA_LIST")
  65. if len(track.splitlines()) != 2:
  66. raise Exception("Unexpected number of entries: %d" % len(track.splitlines()))
  67. if addr1 not in track or addr2 not in track:
  68. raise Exception("Station missing from 2.4 GHz tracking (max limit)")
  69. def test_ap_track_sta_no_probe_resp(dev, apdev):
  70. """Dualband AP not replying to probes from dualband STA on 2.4 GHz"""
  71. try:
  72. _test_ap_track_sta_no_probe_resp(dev, apdev)
  73. finally:
  74. subprocess.call(['iw', 'reg', 'set', '00'])
  75. def _test_ap_track_sta_no_probe_resp(dev, apdev):
  76. dev[0].flush_scan_cache()
  77. params = { "ssid": "track",
  78. "country_code": "US",
  79. "hw_mode": "g",
  80. "channel": "6",
  81. "beacon_int": "10000",
  82. "no_probe_resp_if_seen_on": apdev[1]['ifname'] }
  83. hapd = hostapd.add_ap(apdev[0], params)
  84. bssid = apdev[0]['bssid']
  85. params = { "ssid": "track",
  86. "country_code": "US",
  87. "hw_mode": "a",
  88. "channel": "40",
  89. "track_sta_max_num": "100" }
  90. hapd2 = hostapd.add_ap(apdev[1], params)
  91. bssid2 = apdev[1]['bssid']
  92. dev[0].scan_for_bss(bssid2, freq=5200, force_scan=True)
  93. dev[1].scan_for_bss(bssid, freq=2437, force_scan=True)
  94. dev[0].scan(freq=2437, type="ONLY")
  95. dev[0].scan(freq=2437, type="ONLY")
  96. if dev[0].get_bss(bssid):
  97. raise Exception("2.4 GHz AP found unexpectedly")
  98. def test_ap_track_sta_no_auth(dev, apdev):
  99. """Dualband AP rejecting authentication from dualband STA on 2.4 GHz"""
  100. try:
  101. _test_ap_track_sta_no_auth(dev, apdev)
  102. finally:
  103. subprocess.call(['iw', 'reg', 'set', '00'])
  104. def _test_ap_track_sta_no_auth(dev, apdev):
  105. params = { "ssid": "track",
  106. "country_code": "US",
  107. "hw_mode": "g",
  108. "channel": "6",
  109. "track_sta_max_num": "100",
  110. "no_auth_if_seen_on": apdev[1]['ifname'] }
  111. hapd = hostapd.add_ap(apdev[0], params)
  112. bssid = apdev[0]['bssid']
  113. params = { "ssid": "track",
  114. "country_code": "US",
  115. "hw_mode": "a",
  116. "channel": "40",
  117. "track_sta_max_num": "100" }
  118. hapd2 = hostapd.add_ap(apdev[1], params)
  119. bssid2 = apdev[1]['bssid']
  120. dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
  121. dev[0].scan_for_bss(bssid2, freq=5200, force_scan=True)
  122. dev[1].scan_for_bss(bssid, freq=2437, force_scan=True)
  123. dev[1].connect("track", key_mgmt="NONE", scan_freq="2437")
  124. dev[0].connect("track", key_mgmt="NONE", scan_freq="2437",
  125. freq_list="2437", wait_connect=False)
  126. dev[1].request("DISCONNECT")
  127. ev = dev[0].wait_event([ "CTRL-EVENT-CONNECTED",
  128. "CTRL-EVENT-AUTH-REJECT" ], timeout=10)
  129. if ev is None:
  130. raise Exception("Unknown connection result")
  131. if "CTRL-EVENT-CONNECTED" in ev:
  132. raise Exception("Unexpected connection")
  133. if "status_code=82" not in ev:
  134. raise Exception("Unexpected rejection reason: " + ev)
  135. if "ie=34" not in ev:
  136. raise Exception("No Neighbor Report element: " + ev)
  137. dev[0].request("DISCONNECT")
  138. def test_ap_track_sta_no_auth_passive(dev, apdev):
  139. """AP rejecting authentication from dualband STA on 2.4 GHz (passive)"""
  140. try:
  141. _test_ap_track_sta_no_auth_passive(dev, apdev)
  142. finally:
  143. subprocess.call(['iw', 'reg', 'set', '00'])
  144. def _test_ap_track_sta_no_auth_passive(dev, apdev):
  145. dev[0].flush_scan_cache()
  146. params = { "ssid": "track",
  147. "country_code": "US",
  148. "hw_mode": "g",
  149. "channel": "6",
  150. "no_auth_if_seen_on": apdev[1]['ifname'] }
  151. hapd = hostapd.add_ap(apdev[0], params)
  152. bssid = apdev[0]['bssid']
  153. params = { "ssid": "track",
  154. "country_code": "US",
  155. "hw_mode": "a",
  156. "channel": "40",
  157. "interworking": "1",
  158. "venue_name": "eng:Venue",
  159. "track_sta_max_num": "100" }
  160. hapd2 = hostapd.add_ap(apdev[1], params)
  161. bssid2 = apdev[1]['bssid']
  162. dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
  163. for i in range(10):
  164. dev[0].request("SCAN freq=5200 passive=1")
  165. ev = dev[0].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=5)
  166. if ev is None:
  167. raise Exception("Scan did not complete")
  168. if dev[0].get_bss(bssid2):
  169. break
  170. if i == 9:
  171. raise Exception("AP not found with passive scans")
  172. if "OK" not in dev[0].request("ANQP_GET " + bssid2 + " 258"):
  173. raise Exception("ANQP_GET command failed")
  174. ev = dev[0].wait_event(["RX-ANQP"], timeout=1)
  175. if ev is None or "Venue Name" not in ev:
  176. raise Exception("Did not receive Venue Name")
  177. dev[0].connect("track", key_mgmt="NONE", scan_freq="2437",
  178. freq_list="2437", wait_connect=False)
  179. ev = dev[0].wait_event([ "CTRL-EVENT-CONNECTED",
  180. "CTRL-EVENT-AUTH-REJECT" ], timeout=10)
  181. if ev is None:
  182. raise Exception("Unknown connection result")
  183. if "CTRL-EVENT-CONNECTED" in ev:
  184. raise Exception("Unexpected connection")
  185. if "status_code=82" not in ev:
  186. raise Exception("Unexpected rejection reason: " + ev)
  187. dev[0].request("DISCONNECT")
  188. def test_ap_track_sta_force_5ghz(dev, apdev):
  189. """Dualband AP forcing dualband STA to connect on 5 GHz"""
  190. try:
  191. _test_ap_track_sta_force_5ghz(dev, apdev)
  192. finally:
  193. subprocess.call(['iw', 'reg', 'set', '00'])
  194. def _test_ap_track_sta_force_5ghz(dev, apdev):
  195. params = { "ssid": "track",
  196. "country_code": "US",
  197. "hw_mode": "g",
  198. "channel": "6",
  199. "no_probe_resp_if_seen_on": apdev[1]['ifname'],
  200. "no_auth_if_seen_on": apdev[1]['ifname'] }
  201. hapd = hostapd.add_ap(apdev[0], params)
  202. bssid = apdev[0]['bssid']
  203. params = { "ssid": "track",
  204. "country_code": "US",
  205. "hw_mode": "a",
  206. "channel": "40",
  207. "track_sta_max_num": "100" }
  208. hapd2 = hostapd.add_ap(apdev[1], params)
  209. bssid2 = apdev[1]['bssid']
  210. dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
  211. dev[0].scan_for_bss(bssid2, freq=5200, force_scan=True)
  212. dev[0].connect("track", key_mgmt="NONE", scan_freq="2437 5200")
  213. freq = dev[0].get_status_field('freq')
  214. if freq != '5200':
  215. raise Exception("Unexpected operating channel")
  216. dev[0].request("DISCONNECT")
  217. def test_ap_track_sta_force_2ghz(dev, apdev):
  218. """Dualband AP forcing dualband STA to connect on 2.4 GHz"""
  219. try:
  220. _test_ap_track_sta_force_2ghz(dev, apdev)
  221. finally:
  222. subprocess.call(['iw', 'reg', 'set', '00'])
  223. def _test_ap_track_sta_force_2ghz(dev, apdev):
  224. params = { "ssid": "track",
  225. "country_code": "US",
  226. "hw_mode": "g",
  227. "channel": "6",
  228. "track_sta_max_num": "100" }
  229. hapd = hostapd.add_ap(apdev[0], params)
  230. bssid = apdev[0]['bssid']
  231. params = { "ssid": "track",
  232. "country_code": "US",
  233. "hw_mode": "a",
  234. "channel": "40",
  235. "no_probe_resp_if_seen_on": apdev[0]['ifname'],
  236. "no_auth_if_seen_on": apdev[0]['ifname'] }
  237. hapd2 = hostapd.add_ap(apdev[1], params)
  238. bssid2 = apdev[1]['bssid']
  239. dev[0].scan_for_bss(bssid2, freq=5200, force_scan=True)
  240. dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
  241. dev[0].connect("track", key_mgmt="NONE", scan_freq="2437 5200")
  242. freq = dev[0].get_status_field('freq')
  243. if freq != '2437':
  244. raise Exception("Unexpected operating channel")
  245. dev[0].request("DISCONNECT")
  246. def test_ap_track_taxonomy(dev, apdev):
  247. """AP tracking STA taxonomy"""
  248. try:
  249. _test_ap_track_taxonomy(dev, apdev)
  250. finally:
  251. dev[1].request("SET p2p_disabled 0")
  252. subprocess.call(['iw', 'reg', 'set', '00'])
  253. dev[0].flush_scan_cache()
  254. dev[1].flush_scan_cache()
  255. dev[2].flush_scan_cache()
  256. def _test_ap_track_taxonomy(dev, apdev):
  257. params = { "ssid": "track",
  258. "country_code": "US",
  259. "hw_mode": "g",
  260. "channel": "6",
  261. "track_sta_max_num": "2" }
  262. hapd = hostapd.add_ap(apdev[0], params)
  263. bssid = apdev[0]['bssid']
  264. dev[0].scan_for_bss(bssid, freq=2437, force_scan=True)
  265. addr0 = dev[0].own_addr()
  266. dev[0].connect("track", key_mgmt="NONE", scan_freq="2437")
  267. dev[1].request("SET p2p_disabled 1")
  268. dev[1].scan_for_bss(bssid, freq=2437, force_scan=True)
  269. addr1 = dev[1].own_addr()
  270. dev[1].connect("track", key_mgmt="NONE", scan_freq="2437")
  271. wpas = WpaSupplicant(global_iface='/tmp/wpas-wlan5')
  272. wpas.interface_add("wlan5")
  273. wpas.request("SET model_name track test")
  274. wpas.scan_for_bss(bssid, freq=2437, force_scan=True)
  275. addr = wpas.own_addr()
  276. wpas.connect("track", key_mgmt="NONE", scan_freq="2437")
  277. if "FAIL" not in hapd.request("SIGNATURE abc"):
  278. raise Exception("SIGNATURE failure not reported (1)")
  279. if "FAIL" not in hapd.request("SIGNATURE 22:33:44:55:66:77"):
  280. raise Exception("SIGNATURE failure not reported (2)")
  281. res = hapd.request("SIGNATURE " + addr0)
  282. logger.info("sta0: " + res)
  283. if not res.startswith("wifi4|probe:"):
  284. raise Exception("Unexpected SIGNATURE prefix")
  285. if "|assoc:" not in res:
  286. raise Exception("Missing assoc info in SIGNATURE")
  287. if "wps:track_test" in res:
  288. raise Exception("Unexpected WPS model name")
  289. res = hapd.request("SIGNATURE " + addr1)
  290. logger.info("sta1: " + res)
  291. if not res.startswith("wifi4|probe:"):
  292. raise Exception("Unexpected SIGNATURE prefix")
  293. if "|assoc:" not in res:
  294. raise Exception("Missing assoc info in SIGNATURE")
  295. if "wps:" in res:
  296. raise Exception("Unexpected WPS info");
  297. if ",221(0050f2,4)," in res:
  298. raise Exception("Unexpected WPS IE info");
  299. if ",221(506f9a,9)," in res:
  300. raise Exception("Unexpected P2P IE info");
  301. res = hapd.request("SIGNATURE " + addr)
  302. logger.info("sta: " + res)
  303. if not res.startswith("wifi4|probe:"):
  304. raise Exception("Unexpected SIGNATURE prefix")
  305. if "|assoc:" not in res:
  306. raise Exception("Missing assoc info in SIGNATURE")
  307. if "wps:track_test" not in res:
  308. raise Exception("Missing WPS model name")
  309. if ",221(0050f2,4)," not in res:
  310. raise Exception("Missing WPS IE info");
  311. if ",221(506f9a,9)," not in res:
  312. raise Exception("Missing P2P IE info");
  313. addr2 = dev[2].own_addr()
  314. res = hapd.request("SIGNATURE " + addr2)
  315. if "FAIL" not in res:
  316. raise Exception("Unexpected SIGNATURE success for sta2 (1)")
  317. for i in range(10):
  318. dev[2].request("SCAN freq=2437 passive=1")
  319. ev = dev[2].wait_event(["CTRL-EVENT-SCAN-RESULTS"], timeout=10)
  320. if ev is None:
  321. raise Exception("Scan did not complete")
  322. if dev[2].get_bss(bssid):
  323. break
  324. res = hapd.request("SIGNATURE " + addr2)
  325. if "FAIL" not in res:
  326. raise Exception("Unexpected SIGNATURE success for sta2 (2)")
  327. dev[2].connect("track", key_mgmt="NONE", scan_freq="2437")
  328. res = hapd.request("SIGNATURE " + addr2)
  329. if "FAIL" not in res and len(res) > 0:
  330. raise Exception("Unexpected SIGNATURE success for sta2 (3)")
  331. dev[2].scan_for_bss(bssid, freq=2437, force_scan=True)
  332. res = hapd.request("SIGNATURE " + addr2)
  333. logger.info("sta2: " + res)
  334. if not res.startswith("wifi4|probe:"):
  335. raise Exception("Unexpected SIGNATURE prefix")
  336. if "|assoc:" not in res:
  337. raise Exception("Missing assoc info in SIGNATURE")